{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:40:30Z","timestamp":1730302830249,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/vetecs.2006.1682941","type":"proceedings-article","created":{"date-parts":[[2006,9,8]],"date-time":"2006-09-08T21:17:52Z","timestamp":1157750272000},"page":"831-835","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient Scheme for Encrypted Data Aggregation on Sensor Networks"],"prefix":"10.1109","volume":"2","author":[{"family":"Tieyan Li","sequence":"first","affiliation":[]},{"family":"Yongdong Wu","sequence":"additional","affiliation":[]},{"family":"Huafei Zhu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Public Key Encryption with Keyword Search","author":"boneh","year":"2004","journal-title":"Eurocrypt"},{"journal-title":"Privacy-Enhanced Searches Using Encrypted Bloom Filters","year":"0","author":"bellovin","key":"22"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301328"},{"journal-title":"Building Secure Indexes for Searching Efficiently on Encrypted Compressed Data","year":"0","author":"goh","key":"23"},{"key":"18","first-page":"44","article-title":"Practical Techniques for Searches on Encrypted Data","author":"song","year":"2000","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2003.1258475"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958521"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2004.10129096"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ITAPP.2010.5566625"},{"journal-title":"FIPS PUB 197 The official AES standard","year":"0","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"21","article-title":"Building Decision Tree Classifier on Private Data","author":"wenliang","year":"2002","journal-title":"IEEE International Conference on Data Mining"},{"year":"0","key":"3"},{"key":"20","article-title":"Building an Encrypted and Searchabe Audit Log","author":"waters","year":"2004","journal-title":"Proc 10th Ann Network and Distributed System Security Symp (NDSS)"},{"key":"2","article-title":"The worldwide wardrive: The myths, the misconceptions, the truth and the future","volume":"11","author":"hurley","year":"2003","journal-title":"DefCon"},{"journal-title":"OpenSSL","year":"0","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1321"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031515"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2004.1381904"},{"year":"0","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379006"},{"year":"0","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/SNPA.2003.1203362"}],"event":{"name":"2006 IEEE 63rd Vehicular Technology Conference","location":"Melbourne, Australia"},"container-title":["2006 IEEE 63rd Vehicular Technology Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/11096\/35442\/01682941.pdf?arnumber=1682941","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T18:00:41Z","timestamp":1489600841000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1682941\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/vetecs.2006.1682941","relation":{},"subject":[]}}